| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910480547503321 |
|
|
Autore |
Scholte op Reimer Wilma |
|
|
Titolo |
Evidence-based nursing [[electronic resource] ] : van kijken naar zien en van weten naar doen / / Wilma J. M. Scholte op Reimer |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Amsterdam, : HVA Publicaties, 2009 |
|
|
|
|
|
|
|
ISBN |
|
1-282-45411-0 |
9786612454110 |
90-485-1251-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (41 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Evidence-based nursing - Standards |
Nursing assessment |
Nursing - Standards |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Openbare Les uitgesproken op 24 juni 2009 Hogeschool van Amsterdam." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Dankwoord; Literatuur; Curriculum Vitae |
|
|
|
|
|
|
Sommario/riassunto |
|
Dat goed opgeleide verpleegkundigen nu en in de toekomst hard nodig zijn is niet nieuw. Zeker in academische ziekenhuizen, top-klinische centra en teaching hospitals is deze behoefte uitgesproken. Goed opgeleide verpleegkundigen op hbo-niveau zijn jonge professionals, die in de ogen van het werkveld en de maatschappij de juiste bagage hebben meegekregen voor een goede start en verdere groei. Wilma Scholte op Reimer legt in deze openbare les, aan de hand van een verhaal van een verpleegkundige in opleiding, uit hoe zij als lector de komende jaren hieraan een steentje wil bijdragen. Het illustre |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910784619703321 |
|
|
Autore |
Winkler Ira |
|
|
Titolo |
Zen and the art of information security [[electronic resource] /] / Ira Winkler |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress, c2007 |
|
|
|
|
|
|
|
ISBN |
|
1-281-07710-0 |
9786611077105 |
0-08-055474-1 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (193 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer crimes - Prevention |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Zen and the Art of Information Security; Copyright Page; Contents; Introduction; Why You Shouldn't Buy This Book; Chapter 1. Zen and the Art of Cybersecurity; Philosophy of Security; Chapter 2. Why l Don't Like the Title of This Book; What Makes a Scientist; Why Some People are Better Scientists; Putting it All Together; Applying Science; Chapter 3. What is Security?; Risk; What is a Security Program?; Optimizing Risk; Consciously Accept Risk; Chapter 4. A Bad Question; Value has Nothing to do With Computers; A Typical Security Budget; Determining A Security Budget |
Multiyear BudgetsRemind the CIO the I means Information; Making Risk a Conscious Decision; Chapter 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor; Dragons Forgive Incompetency; Terrorists Really Aren't That Good; The People You Really Have to Worry About; Look for Snakes, Not Dragons; Don't Suffer Death By 1,000 Cuts; Chapter 7. Cyberterrorism is Not Effective; Anthrax vs. Nimda; It is Easier to Blow Things Up; What is a Terrorist?; Chapter 8. Common Sense and Common Knowledge; Wanting Benefit Without the Associated Costs |
Some People Are Just StupidThe Wizard of Oz; Chapter 9. Never |
|
|
|
|
|
|
|
|
|
|
|
Underestimate the Stupidity of a Criminal; There is a Difference Between Being Good and Being Effective; Understanding your Adversary; The Criminal Mindset; Your Kids are Notas Smart as You Think; Chapter 10. Information Security Is INFORMATION Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat It; Chapter 13. Ira's Golden Rules; Take Responsibility; Decide Security is a Must |
Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note on Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible; Appendix A: Critical Moments in Computer Security History; Index; Syngress: The Definition of a Serious Security Library |
|
|
|
|
|
|
Sommario/riassunto |
|
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of t |
|
|
|
|
|
|
|
| |